Secrets and lies : digital security in a networked world / Bruce Schneier.
Material type: TextPublication details: Indianapolis, Ind. : Wiley, 2004.Edition: Pbk. edDescription: xxii, 414 p. ; 23 cmISBN:- 0471453803
- 9780471453802
- Digital security in a networked world
- QA76.9.A25 S352 2000
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | MAIN General | AUE Library Collection | QA76.9.A25 S352 2000 (Browse shelf(Opens below)) | 1 | Available | 10023821 | ||
Books | MAIN General | AUE Library Collection | QA76.9.A25 S352 2000 (Browse shelf(Opens below)) | 2 | Available | 10023841 |
Browsing MAIN shelves, Shelving location: General, Collection: AUE Library Collection Close shelf browser (Hides shelf browser)
QA76.9.A25 R36 2014 The InfoSec handbook : | QA76.9 .A25 S35 1996 Applied cryptography : | QA76.9 .A25 S35 1996 Applied cryptography : | QA76.9.A25 S352 2000 Secrets and lies : | QA76.9.A25 S352 2000 Secrets and lies : | QA76.9 .A25 S3523 2007 Information assurance for the enterprise : | QA76.9 .A25 S3523 2007 Information assurance for the enterprise : |
"With new information about post-9/11 security."--Cover.
Originally published: 2000.
Book copyrighted 2000, Chapters 1 and Introduction are copyrighted 2004.
Includes bibliographical references and index.
An expert in cryptography and electronic security explores computer systems and threats, the hacker mindset, threat modeling, preventative technologies, and the implementation of security systems.
1.. Introduction -- Part 1. The Landscape -- 2.. Digital Threats -- 3.. Attacks -- 4.. Adversaries -- 5.. Security Needs -- Part 2. Technologies -- 6.. Cryptography -- 7.. Cryptography in Context -- 8.. Computer Security -- 9.. Identification and Authentication -- 10.. Networked-Computer Security -- 11.. Network Security -- 12.. Network Defenses -- 13.. Software Reliability -- 14.. Secure Hardware -- 15.. Certificates and Credentials -- 16.. Security Tricks -- 17.. The Human Factor -- Part 3. Strategies -- 18.. Vulnerabilities and the Vulnerability Landscape -- 19.. Threat Modeling and Risk Assessment -- 20.. Security Policies and Countermeasures -- 21.. Attack Trees -- 22.. Product Testing and Verification -- 23.. The Future of Products -- 24.. Security Processes -- 25.. Conclusion.
There are no comments on this title.